메뉴 건너뛰기




Volumn 16, Issue 4, 2013, Pages 787-796

Outsourcing computation of modular exponentiations in cloud computing

Author keywords

Cloud computing; Modular exponentiation; Outsourcing computation; Security and privacy

Indexed keywords

CRYPTOGRAPHY; OUTSOURCING;

EID: 84888824020     PISSN: 13867857     EISSN: 15737543     Source Type: Journal    
DOI: 10.1007/s10586-013-0252-0     Document Type: Article
Times cited : (53)

References (31)
  • 1
    • 77955319555 scopus 로고    scopus 로고
    • From secrecy to soundness: efficient verification via secure computation
    • Applebaum, B., Ishai, Y., Kushilevitz, E.: From secrecy to soundness: efficient verification via secure computation. In: ICALP 2010, pp. 152-163 (2010).
    • (2010) ICALP 2010 , pp. 152-163
    • Applebaum, B.1    Ishai, Y.2    Kushilevitz, E.3
  • 3
    • 77955095511 scopus 로고    scopus 로고
    • A cost-benefit analysis of using cloud computing to extend the capacity of clusters
    • Assuncao, M. D., Costanzo, A., Buyya, R.: A cost-benefit analysis of using cloud computing to extend the capacity of clusters. Clust. Comput. 13(3), 335-347 (2010).
    • (2010) Clust. Comput. , vol.13 , Issue.3 , pp. 335-347
    • Assuncao, M.D.1    Costanzo, A.2    Buyya, R.3
  • 4
    • 77954521120 scopus 로고    scopus 로고
    • Securely outsourcing linear algebra computations
    • Atallah, M. J., Frikken, K. B.: Securely outsourcing linear algebra computations. In: AISACCS 2010, pp. 48-59 (2010).
    • (2010) AISACCS 2010 , pp. 48-59
    • Atallah, M.J.1    Frikken, K.B.2
  • 6
    • 84857752323 scopus 로고    scopus 로고
    • Delegatable homomorphic encryption with applicatoins to secure outsourcing of computation
    • LNCS, Heidelberg: Springer
    • Barbosa, M., Farshim, P.: Delegatable homomorphic encryption with applicatoins to secure outsourcing of computation. In: CT-RSA 2012. LNCS, vol. 7178, pp. 296-312. Springer, Heidelberg (2012).
    • (2012) CT-RSA 2012 , vol.7178 , pp. 296-312
    • Barbosa, M.1    Farshim, P.2
  • 7
    • 80051977699 scopus 로고    scopus 로고
    • Verifiable delegation of computation over large datasets
    • LNCS, Heidelberg: Springer
    • Benabbas, S., Gennaro, R., Vahlis, Y.: Verifiable delegation of computation over large datasets. In: CRYPTO 2011. LNCS, vol. 6841, pp. 111-131. Springer, Heidelberg (2011).
    • (2011) CRYPTO 2011 , vol.6841 , pp. 111-131
    • Benabbas, S.1    Gennaro, R.2    Vahlis, Y.3
  • 8
    • 67650080189 scopus 로고    scopus 로고
    • Private and cheating-free outsourcing of algebraic computations
    • Benjamin, D., Atallah, M. J.: Private and cheating-free outsourcing of algebraic computations. In: PST 2008, pp. 240-245 (2008).
    • (2008) PST 2008 , pp. 240-245
    • Benjamin, D.1    Atallah, M.J.2
  • 9
    • 84957610823 scopus 로고    scopus 로고
    • Speeding up discrete log and factoring based schemes via precomputation
    • LNCS, Heidelberg: Springer
    • Boyko, V., Peinado, M.: Speeding up discrete log and factoring based schemes via precomputation. In: EUROCRRYPTO 1998. LNCS, vol. 1403, pp. 221-232. Springer, Heidelberg (1998).
    • (1998) EUROCRRYPTO 1998 , vol.1403 , pp. 221-232
    • Boyko, V.1    Peinado, M.2
  • 10
    • 84861777392 scopus 로고    scopus 로고
    • Software architecture definition for on-demand cloud provisioning
    • Chapman, C., Emmerich, W., Marquez, F. G., Clayman, S., Galis, A.: Software architecture definition for on-demand cloud provisioning. Clust. Comput. 15(2), 79-100 (2012).
    • (2012) Clust. Comput. , vol.15 , Issue.2 , pp. 79-100
    • Chapman, C.1    Emmerich, W.2    Marquez, F.G.3    Clayman, S.4    Galis, A.5
  • 11
    • 85001025766 scopus 로고
    • Wallet database with observers
    • LNCS, Heidelberg: Springer
    • Chaum, D., Pedersen, T. P.: Wallet database with observers. In: CRYPTO 1992. LNCS, vol. 740, pp. 89-105. Springer, Heidelberg (1993).
    • (1993) CRYPTO 1992 , vol.740 , pp. 89-105
    • Chaum, D.1    Pedersen, T.P.2
  • 12
    • 84865597567 scopus 로고    scopus 로고
    • New algorithms for secure outsourcing of modular exponentiations
    • LNCS, Heidelberg: Springer
    • Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. In: ESORICS 2012. LNCS, vol. 7459, pp. 541-556. Springer, Heidelberg (2012).
    • (2012) ESORICS 2012 , vol.7459 , pp. 541-556
    • Chen, X.1    Li, J.2    Ma, J.3    Tang, Q.4    Lou, W.5
  • 13
    • 77957002840 scopus 로고    scopus 로고
    • Improved delegation of computation using fully homomorphic encryption
    • LNCS, Heidelberg: Springer
    • Chung, K. M., Kalai, Y., Vadhan, S. P.: Improved delegation of computation using fully homomorphic encryption. In: CRYPTO 2010. LNCS, vol. 6223, pp. 483-501. Springer, Heidelberg (2010).
    • (2010) CRYPTO 2010 , vol.6223 , pp. 483-501
    • Chung, K.M.1    Kalai, Y.2    Vadhan, S.P.3
  • 15
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: outsourcing computation to untrusted workers
    • LNCS, Heidelberg: Springer
    • Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: CRYPTO 2010. LNCS, vol. 6223, pp. 465-482. Springer, Heidelberg (2010).
    • (2010) CRYPTO 2010 , vol.6223 , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 17
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1), 186-208 (1989).
    • (1989) SIAM J. Comput. , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 19
    • 84937555419 scopus 로고    scopus 로고
    • Uncheatable distributed computation
    • LNCS, Heidelberg: Springer
    • Golle, P., Mironov, I.: Uncheatable distributed computation. In: CT-RSA 2001. LNCS, vol. 2020, pp. 425-550. Springer, Heidelberg (2001).
    • (2001) CT-RSA 2001 , vol.2020 , pp. 425-550
    • Golle, P.1    Mironov, I.2
  • 21
    • 24144493423 scopus 로고    scopus 로고
    • How to securely outsource cryptographic computations
    • LNCS, Heidelberg: Springer
    • Hohenbergera, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: TCC 2005. LNCS, vol. 3378, pp. 264-282. Springer, Heidelberg (2005).
    • (2005) TCC 2005 , vol.3378 , pp. 264-282
    • Hohenbergera, S.1    Lysyanskaya, A.2
  • 22
    • 0016047180 scopus 로고
    • Computing partitions with applications to the knapsack problem
    • Horowitz, E., Sahni, S.: Computing partitions with applications to the knapsack problem. J. ACM 21(2), 277-292 (1974).
    • (1974) J. ACM , vol.21 , Issue.2 , pp. 277-292
    • Horowitz, E.1    Sahni, S.2
  • 23
    • 84937432284 scopus 로고    scopus 로고
    • Secure server-aided signature generation
    • LNCS, Heidelberg: Springer
    • Jakobsson, M., Wetzel, S.: Secure server-aided signature generation. In: PKC 2001. LNCS, vol. 1992, pp. 383-401. Springer, Heidelberg (2001).
    • (2001) PKC 2001 , vol.1992 , pp. 383-401
    • Jakobsson, M.1    Wetzel, S.2
  • 25
    • 84957654400 scopus 로고
    • Improved efficient arguments
    • LNCS, Heidelberg: Springer
    • Kilian, J.: Improved efficient arguments. In: CRYPTO 1995. LNCS, vol. 963, pp. 311-324. Springer, Heidelberg (1995).
    • (1995) CRYPTO 1995 , vol.963 , pp. 311-324
    • Kilian, J.1
  • 26
    • 85031767993 scopus 로고
    • Speeding up secret computations with insecure auxiliary devices
    • LNCS, Heidelberg: Springer
    • Matsumoto, T., Kato, K., Iami, H.: Speeding up secret computations with insecure auxiliary devices. In: CRYPTO 1990. LNCS, vol. 403, pp. 497-506. Springer, Heidelberg (1990).
    • (1990) CRYPTO 1990 , vol.403 , pp. 497-506
    • Matsumoto, T.1    Kato, K.2    Iami, H.3
  • 29
    • 84858307151 scopus 로고    scopus 로고
    • How to delegate and verify in public: verifiable computation from attribute-based encryption
    • LNCS
    • Parno, B., Raykova, M., Vaikuntanathan, V.: How to delegate and verify in public: verifiable computation from attribute-based encryption. In: TCC 2012. LNCS, vol. 7194, pp. 422-439 (2012).
    • (2012) TCC 2012 , vol.7194 , pp. 422-439
    • Parno, B.1    Raykova, M.2    Vaikuntanathan, V.3
  • 30
    • 84865465739 scopus 로고    scopus 로고
    • Dynamic credentials and ciphertext delegation for attribute-based encryption
    • LNCS, Heidelberg: Springer
    • Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: CRYPTO 2012. LNCS, vol. 7417, pp. 199-217. Springer, Heidelberg (2012).
    • (2012) CRYPTO 2012 , vol.7417 , pp. 199-217
    • Sahai, A.1    Seyalioglu, H.2    Waters, B.3
  • 31
    • 33846200465 scopus 로고
    • Lattice basis reduction: improved practical algorithms and solving subset sum problems
    • Schnorr, C. P., Euchner, M.: Lattice basis reduction: improved practical algorithms and solving subset sum problems. Math. Program. 66(1-3), 181-199 (1994).
    • (1994) Math. Program. , vol.66 , Issue.1-3 , pp. 181-199
    • Schnorr, C.P.1    Euchner, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.